Luxury retailer Neiman Marcus is searching for its first CISO following the company's major data breach last year. Security experts weigh in on the attributes of ideal candidates and offer advice for how they should tackle the job.
During a video interview with Information Security Media Group, FireEye's SVP and COO, Kevin Mandia, details the three stages of advanced threats; attractive nuisances, criminal activity, and nation-state activities.
During a video interview with Information Security Media Group, David DeWalt, CEO of FireEye, discusses what is wrong with the market today, and how it can be fixed.
During a video interview with Information Security Media Group, FireEye's David DeWalt, CEO, and Kevin Mandia, SVP and COO, discuss the new security model, and how to effectively prevent against cyber-threats.
Imagine a cyber-attack that disables an electricity distribution center. What's the role of the U.S. military, government or the utility company in defending and retaliating? That's a question on the mind of Army Col. Gregory Conti.
Paul Smocer of BITS explains why banking institutions, which face increasing cyberthreats, need to put the NIST Cybersecurity Framework to use, and why third parties should prepare for more regulatory scrutiny of their security practices.
If you've considered or adopted the SANS Top 20 Critical Security Controls, Splunk software can help you operationalize and simplify bringing together the disparate data needed to monitor, report and alert on these critical controls. Splunk software has a unique approach that allows you to easily ingest data related...
In the wake of the Heartbleed flaw, a researcher finds new weaknesses in OpenSSL that could be exploited to launch man-in-the-middle attacks, distributed-denial-of-service attacks and remote-code execution on millions of sites.
A proposed UK computer crime bill would increase hacking penalties and criminalize cybercrime attacks that impact the economy, environment or national security. Proving related charges in court, however, could be difficult.
Poor Internet hygiene, not increased cybercrime, is what's really to blame for the increased botnet traffic the online world is battling, say cybersecurity experts Tom Kellermann and Rod Rasmussen.
Financial services firms and energy companies - two industries highly targeted by cybercriminals - must move quickly to address their cybersecurity deficiencies and shore up their defenses against advanced malware threats.
This infographic summarizes the findings of ThreatTrack Security research into what IT...
There's good news on the Zeus Gameover Trojan and Cryptolocker ransomware campaigns: The number of new infections has become "very low," if not fallen to zero. But related attacks could quickly resurge. Learn the reasons why.
The FireEye Advanced Threat Report analyses more than 40,000 advanced attacks across the globe to map out the latest trends in advanced persistent threat (APT) attacks. Leveraging real-time threat intelligence from millions of security alerts across customer deployments, FireEye tracked more than 160 distinct APT...
This first-of-its-kind study examines data from more than 1,600 FireEye network and email appliances in real-world settings. The FireEye devices were part of more than 1,200 "proof-of-value" trials in actual deployments, where they sat behind other defensive layers but were not set to block malicious activity. That...
Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. This all points to the singular resounding reality: the next generation of cyber attacks is already here.
In the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.